mirror of https://github.com/ethereum/go-ethereum
parent
78375608a4
commit
475e8719ba
@ -0,0 +1,24 @@ |
||||
Copyright (c) 2014, tang0th |
||||
All rights reserved. |
||||
|
||||
Redistribution and use in source and binary forms, with or without |
||||
modification, are permitted provided that the following conditions are met: |
||||
* Redistributions of source code must retain the above copyright |
||||
notice, this list of conditions and the following disclaimer. |
||||
* Redistributions in binary form must reproduce the above copyright |
||||
notice, this list of conditions and the following disclaimer in the |
||||
documentation and/or other materials provided with the distribution. |
||||
* Neither the name of tang0th nor the names of its contributors may be |
||||
used to endorse or promote products derived from this software without |
||||
specific prior written permission. |
||||
|
||||
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND |
||||
ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED |
||||
WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE |
||||
DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER BE LIABLE FOR ANY |
||||
DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES |
||||
(INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; |
||||
LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND |
||||
ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT |
||||
(INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS |
||||
SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. |
@ -0,0 +1,19 @@ |
||||
# ECDH |
||||
|
||||
[![Build Status](https://travis-ci.org/wsddn/go-ecdh.svg?branch=master)](https://travis-ci.org/wsddn/go-ecdh) |
||||
|
||||
This is a go implementation of elliptical curve diffie-hellman key exchange method. |
||||
It supports the NIST curves (and any curves using the `elliptic.Curve` go interface) |
||||
as well as djb's curve25519. |
||||
|
||||
The library handles generating of keys, generating a shared secret, and the |
||||
(un)marshalling of the elliptical curve keys into slices of bytes. |
||||
|
||||
## Warning and Disclaimer |
||||
I am not a cryptographer, this was written as part of a personal project to learn about cryptographic systems and protocols. No claims as to the security of this library are made, I would not advise using it for anything that requires any level of security. Pull requests or issues about security flaws are however still welcome. |
||||
|
||||
## Compatibility |
||||
Works with go 1.2 onwards. |
||||
|
||||
## TODO |
||||
* Improve documentation |
@ -0,0 +1,62 @@ |
||||
package ecdh |
||||
|
||||
import ( |
||||
"crypto" |
||||
"io" |
||||
|
||||
"golang.org/x/crypto/curve25519" |
||||
) |
||||
|
||||
type curve25519ECDH struct { |
||||
ECDH |
||||
} |
||||
|
||||
// NewCurve25519ECDH creates a new ECDH instance that uses djb's curve25519
|
||||
// elliptical curve.
|
||||
func NewCurve25519ECDH() ECDH { |
||||
return &curve25519ECDH{} |
||||
} |
||||
|
||||
func (e *curve25519ECDH) GenerateKey(rand io.Reader) (crypto.PrivateKey, crypto.PublicKey, error) { |
||||
var pub, priv [32]byte |
||||
var err error |
||||
|
||||
_, err = io.ReadFull(rand, priv[:]) |
||||
if err != nil { |
||||
return nil, nil, err |
||||
} |
||||
|
||||
priv[0] &= 248 |
||||
priv[31] &= 127 |
||||
priv[31] |= 64 |
||||
|
||||
curve25519.ScalarBaseMult(&pub, &priv) |
||||
|
||||
return &priv, &pub, nil |
||||
} |
||||
|
||||
func (e *curve25519ECDH) Marshal(p crypto.PublicKey) []byte { |
||||
pub := p.(*[32]byte) |
||||
return pub[:] |
||||
} |
||||
|
||||
func (e *curve25519ECDH) Unmarshal(data []byte) (crypto.PublicKey, bool) { |
||||
var pub [32]byte |
||||
if len(data) != 32 { |
||||
return nil, false |
||||
} |
||||
|
||||
copy(pub[:], data) |
||||
return &pub, true |
||||
} |
||||
|
||||
func (e *curve25519ECDH) GenerateSharedSecret(privKey crypto.PrivateKey, pubKey crypto.PublicKey) ([]byte, error) { |
||||
var priv, pub, secret *[32]byte |
||||
|
||||
priv = privKey.(*[32]byte) |
||||
pub = pubKey.(*[32]byte) |
||||
secret = new([32]byte) |
||||
|
||||
curve25519.ScalarMult(secret, priv, pub) |
||||
return secret[:], nil |
||||
} |
@ -0,0 +1,14 @@ |
||||
package ecdh |
||||
|
||||
import ( |
||||
"crypto" |
||||
"io" |
||||
) |
||||
|
||||
// The main interface for ECDH key exchange.
|
||||
type ECDH interface { |
||||
GenerateKey(io.Reader) (crypto.PrivateKey, crypto.PublicKey, error) |
||||
Marshal(crypto.PublicKey) []byte |
||||
Unmarshal([]byte) (crypto.PublicKey, bool) |
||||
GenerateSharedSecret(crypto.PrivateKey, crypto.PublicKey) ([]byte, error) |
||||
} |
@ -0,0 +1,87 @@ |
||||
package ecdh |
||||
|
||||
import ( |
||||
"crypto" |
||||
"crypto/elliptic" |
||||
"io" |
||||
"math/big" |
||||
) |
||||
|
||||
type ellipticECDH struct { |
||||
ECDH |
||||
curve elliptic.Curve |
||||
} |
||||
|
||||
type ellipticPublicKey struct { |
||||
elliptic.Curve |
||||
X, Y *big.Int |
||||
} |
||||
|
||||
type ellipticPrivateKey struct { |
||||
D []byte |
||||
} |
||||
|
||||
// NewEllipticECDH creates a new instance of ECDH with the given elliptic.Curve curve
|
||||
// to use as the elliptical curve for elliptical curve diffie-hellman.
|
||||
func NewEllipticECDH(curve elliptic.Curve) ECDH { |
||||
return &ellipticECDH{ |
||||
curve: curve, |
||||
} |
||||
} |
||||
|
||||
func (e *ellipticECDH) GenerateKey(rand io.Reader) (crypto.PrivateKey, crypto.PublicKey, error) { |
||||
var d []byte |
||||
var x, y *big.Int |
||||
var priv *ellipticPrivateKey |
||||
var pub *ellipticPublicKey |
||||
var err error |
||||
|
||||
d, x, y, err = elliptic.GenerateKey(e.curve, rand) |
||||
if err != nil { |
||||
return nil, nil, err |
||||
} |
||||
|
||||
priv = &ellipticPrivateKey{ |
||||
D: d, |
||||
} |
||||
pub = &ellipticPublicKey{ |
||||
Curve: e.curve, |
||||
X: x, |
||||
Y: y, |
||||
} |
||||
|
||||
return priv, pub, nil |
||||
} |
||||
|
||||
func (e *ellipticECDH) Marshal(p crypto.PublicKey) []byte { |
||||
pub := p.(*ellipticPublicKey) |
||||
return elliptic.Marshal(e.curve, pub.X, pub.Y) |
||||
} |
||||
|
||||
func (e *ellipticECDH) Unmarshal(data []byte) (crypto.PublicKey, bool) { |
||||
var key *ellipticPublicKey |
||||
var x, y *big.Int |
||||
|
||||
x, y = elliptic.Unmarshal(e.curve, data) |
||||
if x == nil || y == nil { |
||||
return key, false |
||||
} |
||||
key = &ellipticPublicKey{ |
||||
Curve: e.curve, |
||||
X: x, |
||||
Y: y, |
||||
} |
||||
return key, true |
||||
} |
||||
|
||||
// GenerateSharedSecret takes in a public key and a private key
|
||||
// and generates a shared secret.
|
||||
//
|
||||
// RFC5903 Section 9 states we should only return x.
|
||||
func (e *ellipticECDH) GenerateSharedSecret(privKey crypto.PrivateKey, pubKey crypto.PublicKey) ([]byte, error) { |
||||
priv := privKey.(*ellipticPrivateKey) |
||||
pub := pubKey.(*ellipticPublicKey) |
||||
|
||||
x, _ := e.curve.ScalarMult(pub.X, pub.Y, priv.D) |
||||
return x.Bytes(), nil |
||||
} |
Loading…
Reference in new issue